setup-browser-cookies

Import cookies from your real Chromium browser into the headless browse session. Interactive picker UI lets you select which cookie domains to import. Use before QA testing authenticated pages. Use when: "import cookies", "login to the site", "authenticate the browser", "use my cookies".

3,891 stars

Best use case

setup-browser-cookies is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Import cookies from your real Chromium browser into the headless browse session. Interactive picker UI lets you select which cookie domains to import. Use before QA testing authenticated pages. Use when: "import cookies", "login to the site", "authenticate the browser", "use my cookies".

Teams using setup-browser-cookies should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/setup-browser-cookies/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/ashish797/founderclaw/setup-browser-cookies/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/setup-browser-cookies/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How setup-browser-cookies Compares

Feature / Agentsetup-browser-cookiesStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Import cookies from your real Chromium browser into the headless browse session. Interactive picker UI lets you select which cookie domains to import. Use before QA testing authenticated pages. Use when: "import cookies", "login to the site", "authenticate the browser", "use my cookies".

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Setup Browser Cookies

Import cookies from your real browser into the headless session. Skip the login flow entirely.

## Why

QA testing authenticated pages requires login. Instead of automating the login flow (slow, flaky, 2FA), just import your existing cookies from Chrome/Firefox/Edge.

## Step 1: Check Browse is Running

```bash
BROWSE="founderclaw/browse/dist/browse"
CONTAINER=1 $BROWSE url
```

If no page loaded yet:

```bash
CONTAINER=1 $BROWSE goto https://yourapp.com
```

## Step 2: Import Cookies

### Option A: Interactive Picker (Recommended)

Opens a web UI where you select which domains to import:

```bash
CONTAINER=1 $BROWSE cookie-import-browser
```

This:
1. Reads cookies from your default browser's profile
2. Opens a picker UI showing all cookie domains
3. You select which domains to import
4. Selected cookies are loaded into the headless session

### Option B: Import from Specific Browser

```bash
CONTAINER=1 $BROWSE cookie-import-browser chrome
CONTAINER=1 $BROWSE cookie-import-browser firefox
CONTAINER=1 $BROWSE cookie-import-browser edge
```

### Option C: Import from JSON File

If you exported cookies manually:

```bash
CONTAINER=1 $BROWSE cookie-import /path/to/cookies.json
```

Cookie JSON format:
```json
[
  {
    "name": "session_id",
    "value": "abc123",
    "domain": ".example.com",
    "path": "/",
    "httpOnly": true,
    "secure": true
  }
]
```

### Option D: Filter by Domain

```bash
CONTAINER=1 $BROWSE cookie-import-browser chrome --domain example.com
```

Only imports cookies matching the specified domain.

## Step 3: Verify

```bash
CONTAINER=1 $BROWSE goto https://yourapp.com
CONTAINER=1 $BROWSE text
```

You should see the authenticated version of the page. No login needed.

Check imported cookies:

```bash
CONTAINER=1 $BROWSE cookies
```

## Supported Browsers

| Browser | Profile Location |
|---------|-----------------|
| Chrome | `~/Library/Application Support/Google/Chrome` (macOS) |
| Firefox | `~/Library/Application Support/Firefox` (macOS) |
| Edge | `~/Library/Application Support/Microsoft Edge` (macOS) |
| Chromium | `~/.config/chromium` (Linux) |

## Troubleshooting

**"No cookies found"** — Make sure the browser is closed (cookies DB may be locked). Or try a different browser.

**"Permission denied"** — Cookie databases are protected. Close the browser first, or run with appropriate permissions.

**"Cookies imported but page still shows login"** — The session may have expired on the server. Re-login in your real browser, then re-import.

## Important

- Imported cookies carry your real session. The headless browser can access your authenticated accounts.
- Don't import cookies on shared/untrusted systems.
- Cookies expire — re-import if the session times out.

Related Skills

my-browser-agent

3891
from openclaw/skills

A custom browser automation skill using Playwright.

Web Automation

rent-my-browser

3891
from openclaw/skills

When the agent is idle, connect to the Rent My Browser marketplace and execute browser tasks for consumers. Earn money by renting out the node's browser during downtime. Supports headless (Playwright) on VPS nodes and real Chrome on GUI machines.

Monetization & Resource Management

browser-cdp

3880
from openclaw/skills

Real Chrome browser automation via CDP Proxy — access pages with full user login state, bypass anti-bot detection, perform interactive operations (click/fill/scroll), extract dynamic JavaScript-rendered content, take screenshots. Triggers (satisfy ANY one): - Target URL is a search results page (Bing/Google/YouTube search) - Static fetch (agent-reach/WebFetch) is blocked by anti-bot (captcha/intercept/empty) - Need to read logged-in user's private content - YouTube, Twitter/X, Xiaohongshu, WeChat public accounts, etc. - Task involves "click", "fill form", "scroll", "drag" - Need screenshot or dynamic-rendered page capture

Web Automation

browser-automation

3891
from openclaw/skills

Automate web browser interactions using natural language via CLI commands. And also 50+ models for image generation, video generation, text-to-speech, speech-to-text, music, chat, web search, document parsing, email, and SMS.

Agent Browser Skill

3891
from openclaw/skills

## Description

stealth-browser

3891
from openclaw/skills

Anti-detection web browsing that bypasses bot detection, CAPTCHAs, and IP blocks using puppeteer-extra with stealth plugin and optional residential proxy support. Use when (1) websites block headless browsers or datacenter IPs, (2) need to bypass Cloudflare/Vercel protection, (3) accessing sites that detect automation (Reddit, Twitter/X, signup flows), (4) scraping protected content, or (5) automating web tasks that require human-like behavior.

agent-browser-zh

3891
from openclaw/skills

A fast Rust-based headless browser automation CLI with Node.js fallback that enables AI agents to navigate, click, type, and snapshot pages via structured commands. (Chinese localized version)

agent-memory-setup

3891
from openclaw/skills

Set up the full OpenClaw agent memory system with 3-tier memory (HOT/WARM/COLD), daily logs, semantic search (QMD), and lossless context management (Lossless Claw). Use when onboarding a new agent, setting up memory for a fresh OpenClaw instance, or when asked to install the memory system on a new agent. Triggers on "set up memory", "install memory system", "onboard new agent memory", "memory setup", "agent onboarding", "configure agent memory", "add memory to my agent", "how do I set up memory", "initialize memory", "memory system for OpenClaw".

agent-memory-setup-v2

3891
from openclaw/skills

Create a 3-tier memory directory structure (HOT/WARM/COLD) for OpenClaw agents and configure the built-in memory-core plugin to use Google Gemini Embeddings 2 (gemini-embedding-2-preview) for semantic memory search. Creates memory/ directories and stub files only — no code execution or external API calls from the setup script. After setup, the agent's memory_search tool uses Gemini's cloud embedding API to index memory files. Requires a free Google Gemini API key. Use when setting up a new agent's memory system or asked about semantic memory search. Triggers on "set up memory", "memory setup", "agent memory", "gemini memory", "semantic search memory", "onboard new agent".

clawcoach-setup

3891
from openclaw/skills

One-time setup for ClawCoach AI health coaching. Configures your profile, goals, macro targets, dietary preferences, and coach personality.

browser-booking-agent

3891
from openclaw/skills

Execute booking/search flows via browser automation with verification artifacts. Use for reservation forms, availability checks, and capture of proof (screenshots/confirmation IDs).

xpoz-setup

3891
from openclaw/skills

Set up and authenticate the Xpoz MCP server for social media intelligence. Required by all Xpoz skills. Handles server configuration, OAuth login, and connection verification with minimal user interaction.